Sciweavers

6518 search results - page 1280 / 1304
» Distributed Individual-Based Simulation
Sort
View
CN
2008
127views more  CN 2008»
13 years 8 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 8 months ago
Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints
The problem of optimal allocation of monitoring resources for tracking transactions progressing through a distributed system, modeled as a queueing network, is considered. Two for...
Animashree Anandkumar, Ting He, Chatschik Bisdikia...
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 8 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
CORR
2008
Springer
156views Education» more  CORR 2008»
13 years 8 months ago
Artificial Immune Systems (AIS) - A New Paradigm for Heuristic Decision Making
Over the last few years, more and more heuristic decision making techniques have been inspired by nature, e.g. evolutionary algorithms, ant colony optimisation and simulated annea...
Uwe Aickelin

Publication
167views
13 years 8 months ago
A Network Coding Approach to IP Traceback
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these packets traversed. This is useful for tracing the sources of high volume traffic, e...
Pegah Sattari, Minas Gjoka, Athina Markopoulou
« Prev « First page 1280 / 1304 Last » Next »